Security Architecture
Architecture andand Design
Design study guide
Study this set o nline at: https://www.cram.co m/flashcards/v-security-architecture-and-
design-2190917
RAM and ROM wi th regards to l oss of power RAM l oses i ntegri ty wi th l oss of power, ROM does not.
Ref erence Moni tor OS - Medi ates al l access between subj ects and obj ects
T rusted Computer System E val uati on Cri teri a (a.k.a. - the Orange Book) Addresses
T CSE C
Conf i denti al i ty, but not I ntegri ty.
What i s the name f or the securi ty rel evant porti ons of a computer system T rusted Computi ng Base (T CB)
1
,CISSP DomainV3 -Security
Security Architecture
Architecture andand Design
Design study guide
Study this set o nline at: https://www.cram.co m/flashcards/v-security-architecture-and-
design-2190917
An i nterf ace between computer hardware and the operati ng system, al l owi ng
Vi rtual i zati on
mul ti pl e guest operati ng systems to run on one host computer.
Looks at l ogi cal hardware, operati ng system and sof tware securi ty components, and
What i s the basi c goal of Securi ty Archi tecture and D esi gn?
how they contri bute to a secure computer system.
Part 1: H ardware and sof tware Part 2: Logi cal model s requi red to keep the system
What are the 3 domai ns of Securi ty Archi tecture and D esi gn?
secure. Part 3: E val uati on model s that quanti f y how secure the system i s.
T he separati on of hardware and sof tware i nto modul ar ti ers. When you change a
Layeri ng
dri ve out on a system, i t has no af f ect on MS Word.
2
,CISSP DomainV3 -Security
Security Architecture
Architecture andand Design
Design study guide
Study this set o nline at: https://www.cram.co m/flashcards/v-security-architecture-and-
design-2190917
I DE I ntegrated D ri ve E l ectroni cs
SCSI Smal l Computer System I nterf ace
Generi c Li st of 4 Securi ty Archi tecture l ayers. 1) H ardware 2) Kernel and devi ce dri vers 3) Operati ng System 4) Appl i cati ons
H i des unnecessary detai l s f rom the user. When a user presses pl ay on MP3, musi c
Abstracti on comes out (even though there are mi l l i ons of cal cul ati ons goi ng on i n the
background).
3
, CISSP DomainV3 -Security
Security Architecture
Architecture andand Design
Design study guide
Study this set o nline at: https://www.cram.co m/flashcards/v-security-architecture-and-
design-2190917
Securi ty D omai n A l i st of obj ects a subj ect i s al l owed to access.
A f orm of CPU hardware l ayeri ng that separates and protects domai ns (such as
What i s the Ri ng Model ? kernel mode and user mode). T he i nnermost ri ng i s most trusted, the outermost ri ng
i s l ess trusted.
1) Kernel Mode (aka Supervi sor mode) - the most trusted and powerf ul part of the
What are the two domai ns of a kernel , and what are thei r basi c meani ngs?
system. 2) User Mode - Where user accounts and thei r processes l i ve.
System cal l s T he method that processes communi cate wi th the kernel i n hardware l ayeri ng.
4